Network Protocols: CRC, MAC, Token Ring, and Bridging
Classified in Geology
Written at on English with a size of 3.75 KB.
Fabric Description and Techniques
This document describes fabric techniques.
Data Link Layer and Network Delimitation
The data link layer is based on data flow. It transmits data and uses key methods. It also uses the physical MDIO method and character account. It includes the insertion of special characters and bit insertion for code violation.
CRC16 and Error Correction
What is CRC16?
CRC16 is used to verify and correct errors. It is used for:
- No errors with odd bits.
- Bursty errors with a length of 16 or inferior.
- Very high bursty errors percentage of greater length.
MAC and Link Layer
Keys Exist When the MAC?
The link layer is divided into two sublayers:
- LLC (Logical Link Control): Performs functions typical of the data link layer.
- MAC (Medium Access Control): Controls access to the medium.
There are two types of MAC:
- Dynamic: Port-based, which wastes bandwidth.
- Static: Centralized, where an element is responsible for allocating the media. Distributed, where the same is in charge of the equipment.
Allocation Techniques with Collision
Allocation techniques with collision include:
- The Aloha method.
- Pure Slotted CSMA method.
- 1-Persistent-CSMA, Non-Persistent-CSMA, and P-Persistent-CSMA, which can cause collision.
- CSMA/CD method.
- Methods free based on reservation.
- Methods free based on consultation.
Wireless Methods
Wireless methods are also discussed.
Differences Between Transparent Bridges and Source Routing
There are differences between transparent bridges and source routing:
- Transparent Bridges: Work in a promiscuous manner, accepting all transmitted data from the LANs, and uses flooding.
- Source Routing: Each issuer must know the network topology. If it does not know where to send a packet, it sends a special flood packet. When the packet reaches a receiver, it sends to the issuer which is the best route to follow.
Token Ring Operation
Token ring uses twisted or fiber pair cable and can handle different optical speeds: 1, 4, 6, and 100 Mbps. It uses encryption and uses a physical topology using the MAU's. It is in charge of the bypass ports when it detects some problem. The token is a byte, the first plot of 3, which runs until the first Aniya transfer captures it. The first two bytes of the token become part of the header of the plot that sends the station. The bits go around and return to Aniya transfer emitted. The token retention time is 10ms.
Sliding Window Protocol
How Does the Sliding Window Protocol Function?
The sliding window protocol is a flow control protocol. It functions as follows:
- Several frames can be transmitted without waiting for intermediate confirmations of each one.
- The first frame can confirm several transmissions.
- The plot does not confirm all transmitted data until the final plot.
- If the size is numbered, the window may reach n = 2n bits. The effect size will vary.
- The receiver and issuer avoid errors.
Bridge Definition, Types, and Uses
Bridges interconnect different networks. They are used in LANs and modify the data link layer. They interconnect networks with different topologies and protocols.
Types of bridges:
- Local: Serve to directly link two physically close networks.
- Extended Area: Connect remote areas, linking two or more local networks, forming an extended area network through telephone lines.